General
-
Target
Swift-pago.pdf.exe
-
Size
38.0MB
-
Sample
211025-vfjfcshcel
-
MD5
08a5400c20f882346a1f2b9e04cff8d2
-
SHA1
2cadd3ff90433197824a547ece57da36435fb64b
-
SHA256
33908ca6bf57c6bbb1375a3d58f4bd5c490451cfad130aaacd61e08020c94e00
-
SHA512
73bbec6ba2c7127c9b65e99b16e202eedc38c0f1e9d8e6e497e211bfb45ced47e5d7db5e17205d92cc064651610d15a815449f036e01f0616b7e175ce5b1a612
Static task
static1
Behavioral task
behavioral1
Sample
Swift-pago.pdf.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Swift-pago.pdf.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alimentostolten.cl - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@
Targets
-
-
Target
Swift-pago.pdf.exe
-
Size
38.0MB
-
MD5
08a5400c20f882346a1f2b9e04cff8d2
-
SHA1
2cadd3ff90433197824a547ece57da36435fb64b
-
SHA256
33908ca6bf57c6bbb1375a3d58f4bd5c490451cfad130aaacd61e08020c94e00
-
SHA512
73bbec6ba2c7127c9b65e99b16e202eedc38c0f1e9d8e6e497e211bfb45ced47e5d7db5e17205d92cc064651610d15a815449f036e01f0616b7e175ce5b1a612
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-